No menu items!
No menu items!
More

    Gcore Radar Warns of a New Era of DDoS Attacks

    Jan 23, 2024The Hacker NewsCybersecurity / Server Security

    DDoS Attack

    As we enter 2024, Gcore has released its latest Gcore Radar report, a twice-annual publication in which the company releases internal analytics to track DDoS attacks. Gcore’s broad, internationally distributed network of scrubbing centers allows them to follow attack trends over time. Read on to learn about DDoS attack trends for Q3–Q4 of 2023, and what they mean for developing a robust protection strategy in 2024.

    Gcore’s Key Findings

    DDoS attack trends for the second half of 2023 reveal alarming developments in the scale and sophistication of cyberthreats.

    Unprecedented Attack Power

    The past three years have brought about a >100% annual increase in DDoS peak (registered maximum) attack volume:

    • In 2021, the peak capacity of DDoS attacks was 300 Gbps
    • In 2022, it increased to 650 Gbps
    • In Q1–Q2 of 2023, it increased again to 800 Gbps
    • In Q3–Q4 of 2023, it surged to 1600 Gbps (1.6 Tbps)

    Notably, the jump in H2 of 2023 means the cybersecurity industry is measuring DDoS attacks in a new unit, Terabits.

    Graph reflecting increasing maximum peak attack volumes in 2021–2023 with 300, 650, and 1600 Gbps respectively
    Maximum attack power in 2021–2023 in Gbps

    This illustrates a significant and ongoing escalation in the potential damage of DDoS attacks, a trend Gcore expects to see continue in 2024.

    Attack Duration

    Gcore saw attack lengths varying from three minutes to nine hours, with an average of about an hour. Usually, short attacks are harder to detect as they don’t for proper traffic analysis due to data scarcity, and since they’re harder to recognize, they’re also harder to mitigate. Longer attacks require more resources to fight, requiring a powerful mitigation response; otherwise, the risk is prolonged server unavailability.

    A graph showing the longest attack Gcore saw in H2 of 2023, shown in bits and packets.
    Gcore’s longest registered attack lasted nine hours

    Predominant Attack Types

    UDP floods continue to dominate, constituting 62% of DDoS attacks. TCP floods and ICMP attacks also remain popular at 16% and 12% of the total, respectively.

    All other DDoS attack types, including SYN, SYN+ACK flood, and RST Flood, accounted for a mere 10% combined. While some attackers may use these more sophisticated approaches, the majority are still focused on delivering sheer packet volume to take down servers.

    Pie chart showing DDoS attack types with UDP flood taking 62%, TCP 16%, ICMP 12%, and other 10%
    Dominant attack types in H2 of 2023

    The variation in attack methods necessitates a multifaceted defense strategy that can protect against a range of DDoS techniques.

    Global Attack Sources

    This global spread of attack sources demonstrates the borderless nature of cyber threats, where attackers operate across national boundaries. Gcore identified diverse attack origins in the latter half of 2023, with the US leading at 24%. Indonesia (17%), the Netherlands (12%), Thailand (10%), Colombia (8%), Russia (8%), Ukraine (5%), Mexico (3%), Germany (2%,) and Brazil (2%) make up the top ten, illustrating a widespread global threat.

    Top attack sources by country, with the US in first place at 24%
    Geographical attack source spread

    The geographic distribution of DDoS attack sources provides important information for creating targeted defense strategies and for shaping international policy-making aimed at combating cybercrime. However, determining the location of the attacker is challenging due to the use of techniques like IP spoofing and the involvement of distributed botnets. This makes it difficult to assess motivations and capabilities, which can vary from state-sponsored actions to individual hackers.

    Targeted Industries

    The most-targeted industries in H2 of 2023 highlight the impact of DDoS attacks across diverse sectors:

    • The gaming industry remains the most affected, enduring 46% of the attacks.
    • The financial sector, including banks and gambling services, came in second at 22%.
    • Telecommunications (18%,) infrastructure-as-a-service (IaaS) providers (7%,) and computer software companies (3%) were also significantly targeted.
    Pie chart of industries targeted by DDoS in 2023 Q3–Q4, with gaming most-hit at 46%.
    DDoS attacks by affected industry

    Since the previous Gcore Radar report, attackers haven’t changed their focus: The gaming and financial sectors are particularly interesting to attackers, likely due to their financial gains and user impact. This underscores a need for targeted cybersecurity strategies in the most-hit industries, like countermeasures for specific gaming servers.

    Analysis

    The data from the latter half of 2023 highlights a worrying trend in the DDoS attack landscape. The increase in attack power to 1.6 Tbps is particularly alarming, signaling a new level of threat for which organizations must prepare. For comparison, even a “humble” 300 Gbps attack is capable of disabling an unprotected server. Paired with the geographical distribution of attack sources, it’s clear that DDoS threats are a serious and global issue, necessitating international cooperation and intelligence sharing to mitigate potentially devastating attacks effectively.

    The range in attack durations suggests that attackers are becoming more strategic, tailoring their approaches to specific targets and objectives:

    • In the gaming sector, for example, assaults are relatively low in power and duration but more frequent, causing repeated disruption to a specific server with the goal of disrupting the player experience to force them to switch to a competitor’s server.
    • For the financial and telecom sectors, where the economic impact is more immediate, attacks are often higher in volume with length highly variable.

    The ongoing targeting of the gaming, financial sectors, telecommunications, and IaaS industries reflects the strategic choice of attackers to pick services whose disruption has a significant economic and operational impact.

    Conclusion

    The Gcore Radar report for Q3–Q4 of 2023 serves as a timely reminder of the ever-evolving nature of cyberthreats. Organizations across sectors must invest in comprehensive and adaptive cybersecurity measures. Staying ahead of DDoS threats requires a keen understanding of the changing patterns and strategies of cyber attackers.

    Gcore DDoS Protection has a proven record of repelling even the most powerful and sustained attacks. Connect Gcore DDoS Protection to protect your business from whatever the 2024 DDoS landscape brings.

    Found this article interesting? Follow us on Twitter and LinkedIn to read more exclusive content we post.

    https://thehackernews.com/2024/01/from-megabits-to-terabits-gcore-radar.html

    Latest articles

    spot_imgspot_img

    Related articles